Question:
1. Describe threats that specifically target confidentiality on a data system. Do not limit yourself to the textbook for answers, and use external resources to support your conclusions.
2. What are the components of two factor authentication? Provide examples to support your answer.
3. Why our database choose important and how are they beneficial in a DBMS?
4. Explain the advantages and disadvantages of operating in the cloud environment. How does this affect data security at risk and in transit?